Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
Top Cited Papers
- 1 April 2014
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 2728-2733
- https://doi.org/10.1109/wcnc.2014.6952860
Abstract
In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity, which acquires, processes and provides information from sensor nodes. Conversely, in the WSN applications in distributed Internet of Things (IoT) architecture, sensor nodes sense data, process, exchange information and perform collaboratively with other sensor nodes and endusers. In order to maintain the trustworthy connectivity and the accessibility of distributed IoT, it is important to establish secure links for end-to-end communication with proper authentication. The authors propose an implicit certificate-based authentication mechanism for WSNs in distributed IoT applications. The developed two-phase authentication protocol allows the sensor nodes and the end-users to authenticate each other and initiate secure connections. The proposed protocol supports the resource scarcity of the sensor nodes, heterogeneity and scalability of the network. The performance and security analysis justify that the proposed scheme is viable to deploy in resource constrained WSNs.Keywords
This publication has 15 references indexed in Scilit:
- Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- DTLS based security and two-way authentication for the Internet of ThingsAd Hoc Networks, 2013
- On the features and challenges of security and privacy in distributed internet of thingsComputer Networks, 2013
- Lightweight host and user authentication protocol for All-IP telecom networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- 6LoWPAN Compressed DTLS for CoAPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Node capture attack detection and defence in wireless sensor networksIET Wireless Sensor Systems, 2012
- GRS: The green, reliability, and security of emerging machine to machine communicationsIEEE Communications Magazine, 2011
- TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Sizzle: A standards-based end-to-end security architecture for the embedded InternetPervasive and Mobile Computing, 2005
- Hybrid Key Establishment for Multiphase Self-Organized Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005